Intelligent Reflecting Surface: A Programmable Wireless Environment for Physical Layer Security
نویسندگان
چکیده
منابع مشابه
Wireless Physical Layer Security
Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical...
متن کاملPhysical Layer Security in Wireless Communication Networks
Physical layer (PHY) security has become an emerging area of research recently. Wireless networks use unguided medium as communication channels, so gathering wireless data transmission is easier when compared to traditional cable systems. With the rise of new security challenges, many different solutions have been offered and are being developed. However, maintaining security in wireless networ...
متن کاملGuest Editorial : Wireless Physical Layer Security
HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau...
متن کاملOptimal Beamforming for Physical Layer Security in MISO Wireless Networks
A wireless network of multiple transmitter-user pairs overheard by an eavesdropper, where the transmitters are equipped with multiple antennas while the users and eavesdropper are equipped with a single antenna, is considered. At different levels of wireless channel knowledge, the problem of interest is beamforming to optimize the users’ quality-of-service (QoS) in terms of their secrecy throug...
متن کاملFrom Quantum to Wireless: A Step Towards Physical-Layer Security
Quantum information theory is widely recognized as an arguably powerful paradigm for physically secure communications. In general, any attack that an eavesdropper, say Eve, perpetrates in order to gain access to messages or keys exchanged by the legitimate parties, say Alice and Bob, will result in disturbances to quantum states that can be detected with overwhelming probability — security is g...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2019
ISSN: 2169-3536
DOI: 10.1109/access.2019.2924034